• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.043 seconds

A Lightweight Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활 지원 시스템을 위한 경량 인증 프로토콜)

  • Yi, Myung-Kyu;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2017
  • Recent advances in healthcare technologies along with improved medical care have led to a steady increase in life expectancy over the past few decades. As a result, the world population is aging rapidly. Various researches have been carried out to provide information and communication technologies based solutions that enhance the well-being of elderly people and provide them with a well margin of independency in their daily life. Ambient assisted living can be defined as the use of information and communication technologies in a person's daily living and working environment to enable them to stay active longer, remain socially connected and live independently into old age. Since the information transmitted in ambient assisted living systems is very sensitive, the security and privacy of such data are becoming important issues that must be dealt with. In this paper, we propose a novel lightweight authentication protocol for the ambient assisted living systems. The proposed authentication protocol not only supports several important security requirements needed by the ambient assisted living systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Bandwidth Allocation and Performance Analysis of MAC Protocol for Ethernet PON (Ethernet PON의 MAC프로토콜의 대역폭 할당 및 성능 분석)

  • 엄종훈;장용석;김성호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.7
    • /
    • pp.261-272
    • /
    • 2003
  • An Ethernet PON(Passive Optical Network) is an economical and efficient access network that has received significant research attention in recent years. A MAC(Media Access Control) protocol of PON , the next generation access network, is based on TDMA(Time Division Multiple Access) basically and can classify this protocol into a fixed length slot assignment method suitable for leased line supporting QoS(Quality of Service) and a variable length slot assignment method suitable for LAN/MAN with the best effort. For analyzing the performance of these protocols, we design an Ethernet PON model using OPNET tool. To establish the maximum efficiency of a network, we verify a MAC protocol and determine the optimal number of ONUs(Optical Network Unit) that can be accepted by one OLT(Optical Line Terminal) and propose the suitable buffer size of ONU based on analyzing the end-to-end Ethernet delay, queuing delay, throughput, and utilization.

An Entropy-based Cooperative-Aided Routing Protocol for Mobile Ad-hoc Wireless Sensor Networks (모바일 Ad-hoc 무선 센서 네트워크를 위한 엔트로피기반 협력도움 라우팅 프로토콜)

  • An, Beong-Ku;Lee, Joo-Sang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.106-113
    • /
    • 2008
  • In this paper, we propose an Entropy-based Cooperative-Aided Routing Protocol (ECARP) in Mobile Ad-hoc fireless Sensor Networks (MAWSN). The main contributions and features of this paper are as follows. First, the entropy-based cooperative routing protocol which is based on node mobility is proposed for supporting stable routing route construction. Second, cooperative data transmission method is used for improving data transmission ratio with the improved SNR. Third, we consider a realistic approach, in the points of view of the MAWSN, based on mobile sensor nodes as well as fixed sensor nodes in sensor fields while the conventional research for sensor networks focus on mainly fixed sensor nodes. The performance evaluation of the proposed routing protocol is performed via simulation and analysis.

Attitude and Practices Among Dentists and Senior Dental Students in Iran Toward Tobacco Cessation as an Effort to Prevent Oral Cancer

  • Razavi, Sayed Mohammad;Zolfaghari, Behzad;Doost, Mostafa Emami;Tahani, Bahareh
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.1
    • /
    • pp.333-338
    • /
    • 2015
  • Background: Oral health professionals are responsible in Iran for providing a brief tobacco cessation program to smoker patients. The aim of this study was to assess Iranian dental student and dentist practice, knowledge and attitudes toward smoking cessation programs. Materials and Methods: A valid and reliable self-administered questionnaire was designed and distributed to 150 dentists working in Isfahan-Iran and 60 dental students. Some questions were developed based on the expected 5A tobacco cessation protocol. Statements on attitudes focused on professional responsibility towards smoking cessation and its effectiveness. Chi-square, ANOVA, and t test were used for statistical analysis. Results: The cessation program in dental settings covers a small group of patients (18%). Some 69.1% (n=96) of dentists reported asking their patients about tobacco use, 64% (n=83) advising their patients to quit, 33.8% (n=47) assessing their patients willingness to quit and 20% (n=28) reported helping their patients in changing their behavior. A far lower percentage reported active involvement in arranging assistance for smokers to quit (4.3%, n=5). Some 22% of students and 26% of dentists disagreed that the tobacco cessation programs should be as part of dentists' professional responsibility and 70% of them were willing to follow the protocol of tobacco cessation for patients. Conclusions: Iranian dentist performance regarding tobacco cessation is weak. Dentists and students indicated their lack of knowledge as the major reason for non-adherence to the protocol. Therefore, planning to encourage dentist to follow the protocol needs continuous educational programs.

Optimal cluster formation in cluster-basedmobile P2P algorithm (클러스터 기반 모바일 P2P 알고리즘의 최적 클러스터 구성)

  • Wu, Hyuk;Lee, Dong-Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.2
    • /
    • pp.204-212
    • /
    • 2011
  • Mobile P2P(Peer-to-Peer) protocols in MANET(mobile ad-hoc networks) have gained much attention recently. Existing P2P protocols can be categorized into structured and unstructured ones. In MANET, structured P2P protocols show large control traffic because they does not consider the locality of P2P data and unstructured P2P protocols have a scalability problem with respect to the number of nodes. Hybrid P2P protocols combine advantages of the structured and unstructured P2P protocols. Cluster-based P2P protocol is one of the hybrid P2P protocols. Our study makes an analysis of the cluster-based P2P protocol and derives the optimal cluster formation in MANET. In the derived optimal cluster formation, the cluster-based P2P protocol shows better performance than Gnutella protocol with respect to control traffic.

Optimum Design of a Communication Protocol for Meteor Burst Communication (유성 버스트 통신을 위한 통신 프로토콜의 최적설계)

  • 권혁숭
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.892-901
    • /
    • 2001
  • Despite of many advantages over conventional radio paths, application of the Meteor Burst Path in commercial communication system is so far limited to a few extent because of its low duty rate, which is, less than several percent at best. In order to get through maximum number of data bits during the short interval of each burst, which normally lives a fractions of a second, a sophisticated communication protocol is called for. In this paper, author introduces a communication protocol which can effectively locate and fetch burst signal by sending out periodic detection signal from master station and, with minimal delay, switch over to transmission states so as to put as many data bits through the detected burst as the burst length permits. By analyzing time period required for each transaction steps, the author derives optimal packet length for various bursts which assures to get a message string through in minimum delay. According to the analysis, the author proposes a protocol including a routine which automatically accesses average length of bursts at each environment and automatically adapt length of data packet so as to maximize data throughput under Riven burst conditions.

  • PDF

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

CASMAC(Context Aware Sensor MAC Protocol) : An Energy Efficient MAC Protocol for Ubiquitous Sensor Network Environments (CASMAC(상황인식 센서 매체접근제어 프로토콜) : USN 환경을 위한 에너지 효율적 MAC 프로토콜)

  • Joo, Young-Sun;Jung, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1200-1206
    • /
    • 2009
  • In this paper, we propose an energy-efficient MAC(Medium Access Control) protocol for processing context information in ubiquitous sensor network environments. CASMAC(Context Aware Sensor MAC) use context information for energy-efficient operation and its operation principle is as follows. First, we make scenarios with possible prediction for CASMAC. And then we save setted context information in server. When event occur at specific sensor node, and then it send three times sample data to server. According to context information, server process sample data. If server process sample data with event, it receive continuous data from event occur node by a transmission request signal. And then server send data transmission stop signal to event occur node when it do not need to data. If server process sample data with no event, it have not reply. Through we make energy consumption tables and an energy consumption model, we simulate analysis of CASMAC performance. In a result, we gains about 5.7 percents energy reduction compared to SMAC.

A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System (온라인 소액결제 시스템에서 금융정보 보호를 위한 스마트카드 기반의 프로토콜 설계)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5872-5878
    • /
    • 2013
  • This study provides two channel structure and two factor authentication. First, a purchasing request by Internet and then user certification and a settlement approval process by mobile communication. Second, it support that proposal protocol utilize a partial factor value of stored in users smartcard, smart phone and password of certificate. Third, storage stability is improved because certificate store in smartcard. Finally, proposal protocol satisfy confidentiality, integrity, authentication, and non- repudiation on required E-commerce guideline. In comparative analysis, Efficiency of the proposal protocol with the existing system was not significantly different. But, In terms of safety for a variety of threats to prove more secure than the existing system was confirmed.

Thromboprophylaxis in Abdominoplasty: Efficacy and Safety of a Complete Perioperative Protocol

  • Marangi, Giovanni Francesco;Segreto, Francesco;Poccia, Igor;Campa, Stefano;Tosi, Daniele;Lamberti, Daniela;Persichetti, Paolo
    • Archives of Plastic Surgery
    • /
    • v.43 no.4
    • /
    • pp.360-364
    • /
    • 2016
  • Background Venous thromboembolism, a spectrum of diseases ranging from deep venous thrombosis to pulmonary embolism, is a major source of morbidity and mortality. The majority of cases described in plastic surgery involve abdominoplasty. Risk assessment and prophylaxis are paramount in such patients. General recommendations were recently developed, but the evidence in the literature was insufficient to prepare exhaustive guidelines regarding the medication, dosage, timing, or length of the prophylaxis. Methods A thromboprophylaxis protocol was developed for patients undergoing abdominoplasty. The protocol consisted of preoperative, intraoperative, and postoperative measures. Enoxaparin was administered as chemoprophylaxis in selected patients. The study involved 253 patients. The patients were analyzed for age, body mass index, enoxaparin dosage, risk factors, and complications. Results Deep venous thrombosis was documented in two cases (0.8%). No pulmonary embolism occurred. Three patients (1.2%) presented mild subcutaneous abdominal hematoma within the first postoperative week that spontaneously resorbed with neither aesthetic nor functional complications. Two patients (0.8%) presented severe hematoma requiring surgical re-intervention for drainage and hemostasis revision. Statistical analysis showed no significant correlation between enoxaparin dosage and hematoma (P=0.18) or deep venous thrombosis (P=0.61). Conclusions The described thromboprophylaxis protocol proved to be effective in the prevention of thrombotic events, with an acceptable risk of hemorrhagic complications. Furthermore, it provides new evidence regarding the currently debated variables of chemoprophylaxis, namely type, dosage, timing, and length.